{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:12:15Z","timestamp":1775913135682,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010667","name":"H2020 Industrial Leadership","doi-asserted-by":"publisher","award":["825333"],"award-info":[{"award-number":["825333"]}],"id":[{"id":"10.13039\/100010667","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484557","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2361-2377","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Secure Multi-party Computation of Differentially Private Heavy Hitters"],"prefix":"10.1145","author":[{"given":"Jonas","family":"B\u00f6hler","sequence":"first","affiliation":[{"name":"SAP Security Research, Karlsruhe, Germany"}]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_9"},{"key":"e_1_3_2_2_3_1","volume-title":"Secure Computation on Floating Point Numbers. In Network and Distributed Systems Security Symposium (NDSS).","author":"Aliasgari Mehrdad","year":"2013","unstructured":"Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, and Aaron Steele. 2013. Secure Computation on Floating Point Numbers. In Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_2_4_1","volume-title":"Smart, and Tim Wood","author":"Aly Abdelrahaman","year":"2020","unstructured":"Abdelrahaman Aly, Marcel Keller, Dragos Rotaru, Peter Scholl, Nigel P. Smart, and Tim Wood. 2020. SCALE--MAMBA Documentation. https:\/\/homes.esat.kuleuven.be\/~nsmart\/SCALE\/."},{"key":"e_1_3_2_2_5_1","volume-title":"Benchmarking Privacy Preserving Scientific Operations. In International Conference on Applied Cryptography and Network Security (ACNS).","author":"Aly Abdelrahaman","year":"2019","unstructured":"Abdelrahaman Aly and Nigel P Smart. 2019. Benchmarking Privacy Preserving Scientific Operations. In International Conference on Applied Cryptography and Network Security (ACNS)."},{"key":"e_1_3_2_2_6_1","unstructured":"Amazon.com. 2020. Amazon Web Services. https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131407"},{"key":"e_1_3_2_2_8_1","volume-title":"WWDC 2016: Engineering Privacy for Your Users. Retrieved","year":"2016","unstructured":"Apple. 2016. WWDC 2016: Engineering Privacy for Your Users. Retrieved October, 2020 from https:\/\/developer.apple.com\/videos\/play\/wwdc2016\/709\/ https:\/\/developer.apple.com\/videos\/play\/wwdc2016\/709\/."},{"key":"e_1_3_2_2_9_1","volume-title":"Differential privacy on finite computers. arXiv preprint arXiv:1709.05396","author":"Balcer Victor","year":"2017","unstructured":"Victor Balcer and Salil Vadhan. 2017. Differential privacy on finite computers. arXiv preprint arXiv:1709.05396 (2017)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417242"},{"key":"e_1_3_2_2_11_1","unstructured":"Raef Bassily Kobbi Nissim Uri Stemmer and Abhradeep Guha Thakurta. 2017. Practical locally private heavy hitters. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_2_13_1","volume-title":"Annual International Cryptology Conference (CRYPTO).","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver. 1991. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference (CRYPTO)."},{"key":"e_1_3_2_2_14_1","volume-title":"On the Round Complexity of the Shuffle Model. arXiv preprint arXiv:2009.13510","author":"Beimel Amos","year":"2020","unstructured":"Amos Beimel, Iftach Haitner, Kobbi Nissim, and Uri Stemmer. 2020. On the Round Complexity of the Shuffle Model. arXiv preprint arXiv:2009.13510 (2020). https:\/\/arxiv.org\/abs\/2009.13510 https:\/\/arxiv.org\/abs\/2009.13510."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_2_17_1","volume-title":"Retrieved","author":"Blog Google Developers","year":"2019","unstructured":"Google Developers Blog. 2019. Enabling developers and organizations to use differential privacy. Retrieved October, 2020 from https:\/\/developers.googleblog.com\/2019\/09\/enabling-developers-and-organizations.html https:\/\/developers.googleblog.com\/2019\/09\/enabling-developers-and-organizations.html."},{"key":"e_1_3_2_2_18_1","volume-title":"Secure Multi-party Computation of Differentially Private Median. In USENIX Security Symposium (USENIXSec).","author":"B\u00f6hler Jonas","year":"2020","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum. 2020. Secure Multi-party Computation of Differentially Private Median. In USENIX Security Symposium (USENIXSec)."},{"key":"e_1_3_2_2_19_1","volume-title":"Secure Sublinear Time Differentially Private Median Computation. In Network and Distributed Systems Security Symposium (NDSS).","author":"B\u00f6hler Jonas","year":"2020","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum. 2020. Secure Sublinear Time Differentially Private Median Computation. In Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2021. Lightweight Techniques for Private Heavy Hitters. (2021).","DOI":"10.1109\/SP40001.2021.00048"},{"key":"e_1_3_2_2_21_1","volume-title":"On the self-decomposability of the Fr\u00e9chet distribution. Indagationes Mathematicae","author":"Bosch Pierre","year":"2013","unstructured":"Pierre Bosch and Thomas Simon. 2013. On the self-decomposability of the Fr\u00e9chet distribution. Indagationes Mathematicae (2013)."},{"key":"e_1_3_2_2_22_1","volume-title":"Data Poisoning Attacks to Local Differential Privacy Protocols. arXiv preprint arXiv:1911.02046","author":"Cao Xiaoyu","year":"2019","unstructured":"Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. 2019. Data Poisoning Attacks to Local Differential Privacy Protocols. arXiv preprint arXiv:1911.02046 (2019). https:\/\/arxiv.org\/abs\/1911.02046."},{"key":"e_1_3_2_2_23_1","volume-title":"European Symposium on Algorithms (ESA).","author":"Hubert Chan TH","year":"2012","unstructured":"TH Hubert Chan, Elaine Shi, and Dawn Song. 2012. Optimal lower bound for differentially private multi-party aggregation. In European Symposium on Algorithms (ESA)."},{"key":"e_1_3_2_2_24_1","volume-title":"Manipulation attacks in local differential privacy. arXiv preprint arXiv:1909.09630","author":"Cheu Albert","year":"2019","unstructured":"Albert Cheu, Adam Smith, and Jonathan Ullman. 2019. Manipulation attacks in local differential privacy. arXiv preprint arXiv:1909.09630 (2019). https:\/\/arxiv.org\/abs\/1909.09630."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0047"},{"key":"e_1_3_2_2_27_1","volume-title":"Methods for finding frequent items in data streams. The VLDB Journal","author":"Cormode Graham","year":"2010","unstructured":"Graham Cormode and Marios Hadjieleftheriou. 2010. Methods for finding frequent items in data streams. The VLDB Journal (2010)."},{"key":"e_1_3_2_2_28_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation.","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, robust, and scalable computation of aggregate statistics. USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_2_30_1","unstructured":"Bolin Ding Janardhan Kulkarni and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_31_1","volume-title":"Optimal Differential Privacy Composition for Exponential Mechanisms. In International Conference on Machine Learning (ICML).","author":"Dong Jinshuo","year":"2020","unstructured":"Jinshuo Dong, David Durfee, and Ryan Rogers. 2020. Optimal Differential Privacy Composition for Exponential Mechanisms. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_32_1","volume-title":"Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. arXiv preprint arXiv:1905.04273","author":"Durfee David","year":"2019","unstructured":"David Durfee and Ryan Rogers. 2019. Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. arXiv preprint arXiv:1905.04273 (2019). (Extended version). https:\/\/arxiv.org\/abs\/1905.04273."},{"key":"e_1_3_2_2_33_1","unstructured":"David Durfee and Ryan Rogers. 2019. Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In International Colloquium on Automata Languages and Programming (ICALP).","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_35_1","volume-title":"Ourselves: Privacy Via Distributed Noise Generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our Data, Ourselves: Privacy Via Distributed Noise Generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_37_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science (2014)."},{"key":"e_1_3_2_2_38_1","volume-title":"Private false discovery rate control. arXiv preprint arXiv:1511.03803","author":"Dwork Cynthia","year":"2015","unstructured":"Cynthia Dwork, Weijie Su, and Li Zhang. 2015. Private false discovery rate control. arXiv preprint arXiv:1511.03803 (2015). https:\/\/arxiv.org\/abs\/1511.03803."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664263"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"David Evans Vladimir Kolesnikov Mike Rosulek et al. 2018. A pragmatic introduction to secure multi-party computation. Foundations and Trends\u00aein Privacy and Security (2018).","DOI":"10.1561\/9781680835090"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_2_43_1","volume-title":"Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. arXiv preprint arXiv:1503.01214","author":"Fanti Giulia","year":"2016","unstructured":"Giulia Fanti, Vasyl Pihur, and \u00dalfar Erlingsson. 2016. Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. arXiv preprint arXiv:1503.01214 (2016). (Extended Version). https:\/\/arxiv.org\/pdf\/1503.01214.pdf."},{"key":"e_1_3_2_2_44_1","volume-title":"International Conference on Machine Learning (ICML).","author":"Ghazi Badih","year":"2020","unstructured":"Badih Ghazi, Ravi Kumar, Pasin Manurangsi, and Rasmus Pagh. 2020. Private counting from anonymous messages: Near-optimal accuracy with vanishing communication overhead. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_45_1","volume-title":"Foundations of Cryptography","author":"Goldreich Oded","unstructured":"Oded Goldreich. 2009. Foundations of Cryptography: Volume 2, Basic Applications."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_2_47_1","volume-title":"A comprehensive comparison of multi-party secure additions with differential privacy","author":"Goryczka Slawomir","year":"2017","unstructured":"Slawomir Goryczka and Li Xiong. 2017. A comprehensive comparison of multi-party secure additions with differential privacy. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"e_1_3_2_2_48_1","volume-title":"Mathematics for the Analysis of Algorithms","author":"Greene Daniel H","unstructured":"Daniel H Greene and Donald E Knuth. 2007. Mathematics for the Analysis of Algorithms. Springer Science & Business Media."},{"key":"e_1_3_2_2_49_1","unstructured":"Mikko Heikkil\u00e4 Eemil Lagerspetz Samuel Kaski Kana Shimizu Sasu Tarkoma and Antti Honkela. 2017. Differentially private Bayesian learning on distributed data. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_50_1","unstructured":"Justin Hsu Sanjeev Khanna and Aaron Roth. 2012. Distributed private heavy hitters. In International Colloquium on Automata Languages and Programming (ICALP)."},{"key":"e_1_3_2_2_51_1","unstructured":"Bargav Jayaraman Lingxiao Wang David Evans and Quanquan Gu. 2018. Distributed learning without distress: Privacy-preserving empirical risk minimization. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Shiva Prasad Kasiviswanathan Homin K Lee Kobbi Nissim Sofya Raskhodnikova and Adam Smith. 2011. What can we learn privately? SIAM J. Comput. (2011).","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_6"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_10"},{"key":"e_1_3_2_2_56_1","volume-title":"Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust","author":"Li Ninghui","year":"2016","unstructured":"Ninghui Li, Min Lyu, Dong Su, and Weining Yang. 2016. Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust (2016)."},{"key":"e_1_3_2_2_57_1","volume-title":"A Proof of Security of Yao's Protocol for Two-Party Computation. Journal of Cryptology","author":"Lindell Yehuda","year":"2009","unstructured":"Yehuda Lindell and Benny Pinkas. 2009. A Proof of Security of Yao's Protocol for Two-Party Computation. Journal of Cryptology (2009)."},{"key":"e_1_3_2_2_58_1","volume-title":"Leveraging Public Data for Practical Private Query Release. arXiv preprint arXiv:2102.08598","author":"Liu Terrance","year":"2021","unstructured":"Terrance Liu, Giuseppe Vietri, Thomas Steinke, Jonathan Ullman, and Zhiwei Steven Wu. 2021. Leveraging Public Data for Practical Private Query Release. arXiv preprint arXiv:2102.08598 (2021). https:\/\/arxiv.org\/pdf\/2102.08598.pdf ."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.14"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","unstructured":"Luca Melis George Danezis and Emiliano De Cristofaro. 2016. Efficient Private Statistics with Succinct Sketches. (2016).","DOI":"10.14722\/ndss.2016.23175"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/867576"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_7"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363204"},{"key":"e_1_3_2_2_66_1","unstructured":"Seth Neel Aaron Roth Giuseppe Vietri and Zhiwei Steven Wu. 2020. Oracle Efficient Private Non-Convex Optimization. (2020). https:\/\/proceedings.icml.cc\/static\/paper_files\/icml\/2020\/354-Paper.pdf ."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818027"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_2_70_1","volume-title":"USENIX Conference on Privacy Engineering Practice and Respect (PEPR).","author":"Rogers Ryan","year":"2020","unstructured":"Ryan Rogers. 2020. A Differentially Private Data Analytics API at Scale. In USENIX Conference on Privacy Engineering Practice and Respect (PEPR)."},{"key":"e_1_3_2_2_71_1","volume-title":"Shraddha Sahay, and Parvez Ahammad.","author":"Rogers Ryan","year":"2020","unstructured":"Ryan Rogers, Subbu Subramaniam, Sean Peng, David Durfee, Seunghyun Lee, Santosh Kumar Kancha, Shraddha Sahay, and Parvez Ahammad. 2020. LinkedIn's Audience Engagements API: A Privacy Preserving Data Analytics System at Scale. arXiv preprint arXiv:2002.05839 (2020). https:\/\/arxiv.org\/abs\/2002.05839."},{"key":"e_1_3_2_2_72_1","volume-title":"How to share a secret. Commun. ACM","author":"Shamir Adi","year":"1979","unstructured":"Adi Shamir. 1979. How to share a secret. Commun. ACM (1979)."},{"key":"e_1_3_2_2_73_1","volume-title":"Differentially Private Distributed Data Analysis. In IEEE International Conference on Collaboration and Internet Computing (CIC).","author":"Takabi Hassan","year":"2016","unstructured":"Hassan Takabi, Samir Koppikar, and Saman Taghavi Zargar. 2016. Differentially Private Distributed Data Analysis. In IEEE International Conference on Collaboration and Internet Computing (CIC)."},{"key":"e_1_3_2_2_74_1","unstructured":"Apple's Differential Privacy Team. 2017. Learning with Privacy at scale. https:\/\/machinelearning.apple.com\/2017\/12\/06\/learning-with-privacy-at-scale.html."},{"key":"e_1_3_2_2_75_1","volume-title":"Retrieved","author":"Machine Learning Group ULB.","year":"2019","unstructured":"Machine Learning Group ULB. 2019. Online Retail. Retrieved October, 2020 from https:\/\/archive.ics.uci.edu\/ml\/datasets\/Online+Retail+II https:\/\/archive.ics.uci.edu\/ml\/datasets\/Online+Retail+II."},{"key":"e_1_3_2_2_76_1","volume-title":"Tutorials on the Foundations of Cryptography","author":"Vadhan Salil","unstructured":"Salil Vadhan. 2017. The complexity of differential privacy. In Tutorials on the Foundations of Cryptography. Springer."},{"key":"e_1_3_2_2_77_1","volume-title":"USENIX Security Symposium (USENIXSec).","author":"Wang Tianhao","year":"2017","unstructured":"Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In USENIX Security Symposium (USENIXSec)."},{"key":"e_1_3_2_2_78_1","volume-title":"Locally differentially private heavy hitter identification","author":"Wang Tianhao","year":"2019","unstructured":"Tianhao Wang, Ninghui Li, and Somesh Jha. 2019. Locally differentially private heavy hitter identification. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0025"},{"key":"e_1_3_2_2_80_1","volume-title":"Annual IEEE Symposium on Foundations of Computer Science (FOCS).","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In Annual IEEE Symposium on Foundations of Computer Science (FOCS)."},{"key":"e_1_3_2_2_81_1","unstructured":"Wennan Zhu Peter Kairouz Brendan McMahan Haicheng Sun and Wei Li. 2020. Federated Heavy Hitters Discovery with Differential Privacy. In International Conference on Artificial Intelligence and Statistics (AISTATS ). http:\/\/proceedings.mlr.press\/v108\/zhu20a.html http:\/\/proceedings.mlr.press\/v108\/zhu20a\/zhu20a.pdf."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484557","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:45Z","timestamp":1763499285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484557"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":81,"alternative-id":["10.1145\/3460120.3484557","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484557","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}